Resource Report → Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients

The Department of Health and Human Services aims to have more healthcare organizations well-prepared to prevent data breaches in their latest 34-page cybersecurity framework report. The report includes the top cybersecurity practices for healthcare providers. 

Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP)

In early January 2019, The United States Department of Health and Human Services (HHS) released the Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP). This recently-published guide promotes insight to why the healthcare industry must deploy better cyber security practices when it comes to protecting patient information. The report utilizes perspective and data from more than 150 healthcare and cybersecurity experts from the Health Sector Coordinating Council. As a result of this collaboration between security and healthcare professionals, we now have a detailed report of the most common challenges in healthcare security, and how we can address these issues in the future.

The healthcare industry is even more susceptible to cyber attacks because of the inherit value of the stolen data from such organizations. Becker’s Health IT & CIO Report concludes that the average data breach cost per record is around $408 [2] (twice that of the financial, technology, education, and commerce industries). As a result, healthcare providers of all sizes need to continue improving and create dynamic modifications to their security framework. This report builds on the existing National Institute of Standards and Technology (NIST) Cybersecurity Framework which highlights 5 functions of the data security lifecycle: Identify, Protect, Detect, Respond, and Recover.

The document sets to accomplish three core goals:

  • Cost-effectively reduce cyber security risks for a range of healthcare organizations
  • Support the voluntary adoption and implementation of its recommendations
  • Ensure, on an ongoing basis that content is actionable, practical, and relevant to health care stakeholders of every size and resource level

HICP Summary

To provide a more outlined approach to creating a foundational security framework, HHS experts organized the informative piece into separate categories. The Main Document aims to discover the overarching themes of security issues facing the healthcare sector. Technical Volume 1 examines Cybersecurity Practices for small healthcare organizations; Technical Volume 2 highlights security procedures for medium and large healthcare organizations with existing IT and security professionals as part of their workforce. Lastly, HHS delivers The Resources and and Templates Volume. Working in tandem, these appendices give an impressive synopsis of how your organization can get started today with better security processes.

Cyber security risks for the healthcare industry

The HICP highlights several major security breach tactics and how your organization can better prepare to defend against these attacks. Some examples of the threat-risk and necessary framework include:

E-mail Phishing Attack

  • Security standards for employee training, establishing multi-factored authentication policies, and tools for preventing malware-infused emails and communication channels, etc.

Ransomware Attack

Loss or Theft of Equipment or Data

  • Regularly record inventory of assets, highlights importance of physical security practices, benefits of data encryption, etc

Insider, Accidental or Intentional Data Loss

  • Adequately log and audit employee access to patient’s data, monitor physical access controls, training for social engineering and other credential manipulation techniques, etc.

Attacks Against Connected Medical Devices That May Affect Patient Safety

  • Medical devices should be properly secured along with IT equipment used in conjunction with these systems, updating security for legacy medical devices, etc.

Technical volumes

Why are the healthcare cybersecurity practices important?

The Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients doesn’t aim to produce groundbreaking new coverage of threats attacking healthcare organizations. Instead, the focus of the piece is to provide a more contextual and a practical framework to those organizations that don’t have a large security budget and are exposed to these risks. To quote Erik C. Decker, the Chairman of the Board (Association for Executives in Health Care Information Security) “The Task Group determined that it was not feasible to address every cybersecurity challenge across the large and complex U.S. health care industry in a single document. The Task Group therefore made the decision to focus on the most impactful threats, with the goal of significantly moving the cybersecurity needle”. The report is candid in that it reveals cybersecurity is a continuously evolving threat, requiring indefinite attention and resourceful strategy to keep patient data protected and secure. These policies should be consistently re-evaluated to meet the standards and threat landscape facing healthcare organizations in the future.

Proven Data is a supporter of this new publication that aims to contribute more resources and awareness around the protection of healthcare data and records. As we enter a new year, healthcare organizations should make a point to learn about the cost of improving their cyber security foundation to help improve their data loss prevention policies. Cyber crime will continue to evolve, and so should your defense strategy for keeping your patient data and information secure.

You can check out the official Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients from HHS here.

Learn more about healthcare cybersecurity practices

Keep your medical practice safe from cyber threats with our

Top 3 Healthcare Cybersecurity Practices

What do you think?

Leave a Reply
Read more

Related Articles

Contact us

Leading experts on stand-by 24/7/365

If you suspect data loss or network breach, or are looking for ways to test and improve your cyber security – our team can help.

What we offer:
What happens next?
1

Our advisor will reach out with the free consultation

2

We evaluate your inquiry and review solutions

3

We send a custom proposal or quote for approval

Request a Free Consultation